Russia has not only attacked the infrastructure of American democracy: The U.S. government now says that Russia has engaged in a pervasive, wide-ranging cyber-assault on U.S. energy grid and other key components of the U.S. critical infrastructure. These sustained attacks on U.S. critical infrastructure – along with the Russian interference in the 2016 election and the Russian-launched NoPetya malware — were the reasons the administration on Thursday imposed a new round of sanctions on Russia.

British Foreign Secretary Boris Johnson has said it is “overwhelmingly likely” that Russian President Vladimir Putin made the decision to use a highly toxic chemical against a former double agent in England. “We have nothing against the Russians themselves. There is to be no Russophobia as a result of what is happening,” Johnson said on 16 March6, nearly two weeks after former spy Sergei Skripal and his daughter, Yulia, were exposed to what British authorities say was a potent nerve agent developed in the Soviet Union. “Our quarrel is with Putin’s Kremlin, and with his decision — and we think it overwhelmingly likely that it was his decision — to direct the use of a nerve agent on the streets of the U.K., on the streets of Europe for the first time since the Second World War,” Johnson said.

Researchers had found that in an effort to make computer chips more efficient, major manufacturers had inadvertently inserted an opening that would allow hackers to spy on sensitive data. In two papers that were published on 3 January, researchers coined the cyber security threats Meltdown and Spectre. The name Meltdown was chosen for the attack’s ability to “melt” the security system typically enforced by a processor’s hardware. The name Spectre was based on the root cause of the security vulnerability, speculative execution, a speed-enhancing technique in which the processor tries to predict what part of code it will be required to execute next and starts executing it. And, much like a real spectre, the attack is nearly impossible to detect.

The military service chiefs of cybersecurity see an upward trend in the capacity, capabilities, sophistication and persistence of cyber threats against military networks, Navy Vice Adm. Michael M. Gilday, the commander of U.S. Fleet Cyber Command and U.S. 10th Fleet said on Capitol Hill Tuesday.

An emergent type of conflict in recent years has been coined “gray zone,” because it sits in a nebulous area between peace and conventional warfare. Gray-zone action is not openly declared or defined, it’s slower, and is prosecuted more subtly—using social, psychological, religious, information, cyber and other means to achieve physical or cognitive objectives with or without violence. The lack of clarity of intent—the grayness—makes it challenging to detect, characterize, and counter an enemy fighting this way. DARPA launches a new program called COMPASS, to develop software that would help clarify enemy intent by gauging an adversary’s responses to various stimuli.

The 2017 hurricane season was catastrophic. Hurricane Harvey, plaguing Texas with floods, was followed quickly by Irma, whose winds battered Florida and the Caribbean. Hurricane Maria then raged upon Puerto Rico and other islands already reeling from previous storms. In the buildup and aftermath, Lincoln Laboratory quickly assembled teams and technology to aid federal agencies in managing these disasters. Lincoln Laboratory staff deployed tools to help FEMA plan evacuations, monitor storms, and assess the damage wrought by Hurricanes Harvey, Irma, and Maria.

Even if South Africa uses less water and applies all of government’s existing plans, the country will still face a water crisis in the next twenty years. Solutions are within reach – but turning things around will take significant financial investment and political will. A new study sets out aggressive measures to offset guaranteed water shortages in the future.

The U.S. Treasury has issued its strongest sanctions yet against Russia in response to what it called “ongoing nefarious attacks.” The move targets five entities and nineteen individuals. Among the institutions targeted in the new sanctions for election meddling were Russia’s top intelligence services, Federal Security Service (FSB) and Main Intelligence Directorate (GRU), the two organizations whose hackers, disinformation specialists, and outside contractors such as the Internet Research Agency (IRA) troll farm were behind — and are still engaged in — a broad and sustained campaign to undermine U.S. democracy.

British Foreign Secretary Boris Johnson has said that the country’s law enforcement agencies were investigating rich Russian individuals with assets in Britain, and suggested that those who owe their wealth to their ties with President Vladimir Putin could be brought to justice. Allies have expressed support for Britain’s assessment that Russia was behind the attack, with French President Emmanuel Macron saying that he would announce unspecified “measures” in the coming days. And NATO Secretary-General Jens Stoltenberg said the “unacceptable” attack was part of “a reckless pattern of Russian behavior over many years.”

Novichok, the toxic nerve agent that British authorities believe was used in the near-fatal poisoning of former spy and retired Russian military intelligence officer Sergei Skripal, is a powerful substance that is exceedingly difficult to manufacture. This is why a growing number of chemical weapons experts say it is highly likely that only a government could have the technology and infrastructure to make it. And given that the Soviet Union, in the 1980s, was the only state known to have produced it, that has led many experts to conclude that Russian intelligence was behind Skripal’s poisoning.

The U.S. Court of Appeals for the Fifth Circuit in U.S. v. Molina-Isidoro recently issued an encouraging opinion related to the digital privacy of travelers crossing the U.S. border. The Electronic Frontier Foundation (EFF) filed an amicus brief last year in the case, arguing that the Supreme Court’s decision in Riley v. California (2014) supports the conclusion that border agents need a probable cause warrant before searching electronic devices because of the unprecedented and significant privacy interests travelers have in their digital data. In Riley, the Supreme Court followed similar reasoning and held that police must obtain a warrant to search the cell phone of an arrestee.

The major drivers of high healthcare costs in the U.S. appear to be higher prices for nearly everything—from physician and hospital services to diagnostic tests to pharmaceuticals—and administrative complexity. The study confirmed that the U.S. has substantially higher spending, worse population health outcomes, and worse access to care than other wealthy countries.

A new multistate surveillance study by the Centers for Disease Control and Prevention (CDC) has found that the incidence of a multidrug-resistant bacterial pathogen capable of causing severe infections and spreading easily is low and mainly confined to healthcare facilities. And CDC officials would like to keep it that way. a team of researchers from the CDC and public health departments across the country report that the overall annual incidence of carbapenem-nonsusceptible Acinetobacter baumannii is 1.2 cases per 100,000 persons, and that nearly all the cases were healthcare-associated.

More than 10 million acres burned across the country during the 2017 U.S. wildfire season at a cost of more than $2 billion — the largest bill ever. And while many factors affect the risk for wildfires, new research shows that a flurry of homebuilding near wild areas since 1990 has greatly increased the number of homes at risk from wildfires while increasing the costs associated with fighting those fires in increasingly dense developments.

Scientists have linked the frequency of extreme winter weather in the United States to Arctic temperatures. “Warm temperatures in the Arctic cause the jet stream to take these wild swings, and when it swings farther south, that causes cold air to reach farther south. These swings tend to hang around for awhile, so the weather we have in the eastern United States, whether it’s cold or warm, tends to stay with us longer,” one scientist explains.

Iran has a network of 10-13 military bases in Syria according to a new study. The study includes a map of Iranian bases, details of each base and an analysis of the strength of the main Shia militias operating in Syria. The bases have tens of thousands of troops from the Iranian Revolutionary Guard Corp (IRGC), as well as missiles and transfer facilities to support Hezbollah, the Lebanese Shia militia.

Novichok, the powerful nerve agent that British Prime Minister Theresa May says was used in the attack on former Russian spy Sergei Skripal and his daughter, Yulia, means “newcomer” in Russian. But the military grade chemical is anything but. Developed in the former Soviet Union in the 1970s and 1980s, novichoks are a group of advanced nerve agents designed to circumvent chemical weapons treaties and penetrate protective gear used by NATO forces.

British Prime Minister Theresa May says evidence shows that it is “highly likely” that Russia is behind the nerve-agent attack on a former Russian spy and his daughter in the city of Salisbury despite Kremlin denials that Moscow was involved in the incident.Home Secretary Amber Rudd said police were examining more than 200 pieces of evidence, had identified more than 240 witnesses, and were looking through security camera footage.

The long view

The West’s adversaries “have become masters at exploiting the seams between peace and war. What constitutes a weapon in this grey area no longer has to go ‘bang’. Energy, cash - as bribes - corrupt business practices, cyber-attacks, assassination, fake news, propaganda and indeed military intimidation are all examples of the weapons used to gain advantage in this era of ‘constant competition,’ and the rules-based international architecture that has assured our stability and prosperity since 1945 is, I suggest therefore, threatened,” Sir Nicholas Carter, the British Army chief of staff, said last week. “The deduction we should draw from this is that there is no longer two clear and distinct states of ‘peace’ and ‘war’; we now have several forms. Indeed the character of war and peace is different for each of the contexts in which these ‘weapon systems’ are applied,” he added. “The arch exponent of this [new approach to war] is Russia…. I believe it represents the most complex and capable state-based threat to our country since the end of the Cold War. And my fellow Chiefs of Staff from the United States, France, and Germany shared this view.”

In an important new report on the challenges that Russia’s aggressive posture poses for U.S. interests in the world, and to U.S. democratic institutions and social cohesion at home, Council on Foreign Relations Senior Fellows Robert D. Blackwill and Philip H. Gordon warn that the United States has so far failed to elevate Russia’s intervention in U.S. elections to the national priority that it is. They add that the United States has neglected to respond to Russia’s intervention in a way sufficient to deter future attacks. They argue, “A wide range of additional measures is therefore needed in order to better protect U.S. society and political and electoral systems from further intervention.”

Last week, a U.S. government report outlined attacks made by Russian President Vladimir Putin on democratic institutions over nearly two decades. The report details the many ways in which the Russian government has combined Soviet-era approaches with today’s technological tools. Princeton’s Jacob Shapiro says: “While not a revelation to people who have been following the issue, the depth and intensity of Russian efforts against America’s allies in Europe are striking and well-documented in the report. While some may argue that turnabout is fair play insofar as the United States and its European allies have been aggressively pushing their vision of governance inside Russia and its allies for decades, those efforts have taken place in the context of institutions that abide by widely accepted legal norms. What is striking about the Russian effort is the extent to which it employed actors and approaches that clearly and routinely transgress Russian, international, and domestic laws in the places they operate. To me, the extralegal nature of Russian influence efforts was just striking.”

Americans continue to investigate, deliberate, and wallow in the aftermath of Russia’s rebirth of “Active Measures” designed to defeat their adversaries through the “force of politics rather than the politics of force.” Kremlin interference in the 2016 U.S. presidential election represents not only the greatest Active Measures success in Russian history, but the swiftest and most pervasive influence effort in world history. Never has a country, in such a short period of time, disrupted the international order through the use of information as quickly and with such sustained effect as Russia has in the last four years. Russia achieved this victory by investing in capabilities where its adversaries have vulnerabilities — cyberspace and social media. Putin’s greatest success through the employment of cyber-enabled Active Measures comes not from winning any single election, but through the winning of sympathetic audiences around the world he can now push, pull, and cajole from within the borders of his adversaries. Much has been learned about Russia’s hackers and troll farms in the year since the 2016 presidential election, but there remain greater insights worth exploring from a strategic perspective when looking at the Kremlin’s pursuit of information warfare holistically.

Americans’ reliance on facts to discuss public issues has declined significantly in the past two decades, leading to political paralysis and collapse of civil discourse, according to a RAND report. This phenomenon, referred to as “Truth Decay,” is defined by increasing disagreement about facts, a blurring between opinion and fact, an increase in the relative volume of opinion and personal experience over fact, and declining trust in formerly respected sources of factual information.

Winston Churchill is reported to have said, “A lie gets halfway around the world before the truth can get its pants on.” Experts say it is worse now. With social media, false or misleading information is disseminated all over the world nearly instantaneously. Another thing that’s new about Truth Decay is the confluence of factors that are interacting in ways we do not fully understand yet. It is not clear that key drivers like our cognitive biases, polarization, changes in the information space, and the education system’s struggle to respond to this sort of challenge have ever coincided at such intensive and extreme levels as they do now. Russian disinformation and hacking campaigns against the United States and other Western democracies are the most obvious examples of the amplification – and exploitation – of Truth Decay. Garry Kasparov, the chess master and Russian dissident, said about Russian disinformation efforts: “The point of modern propaganda isn’t only to misinform or push an agenda. It is to exhaust your critical thinking … to annihilate truth.”

Over the past year, there has been rising pressure on Facebook, Google, and Twitter to account for how bad actors are exploiting their platforms. The catalyst of this so-called “tech-lash” was the revelation last summer that agents of the Russian government engaged in disinformation operations using these services to influence the 2016 presidential campaigns. The investigation into the Russian operation pulled back the curtain on a modern Internet marketplace that enables widespread disinformation over online channels. The authors of a new report say we have only begun to scratch the surface of a much larger ecosystem of digital advertising and marketing technologies.

Seth Mnookin is a professor of science writing, director of the Graduate Program in Science Writing, and director of the MIT Communications Forum. In his most recent book, The Panic Virus: The True Story Behind the Vaccine-Autism Controversy, which won the Science in Society Award, Mnookin tackles a fundamental question: How do we decide what the truth is? Mnookin recently spoke about the state of journalism in an era when public trust is threatened by cries of “fake news” from political partisans aiming to discredit unflattering stories and to diminish the efficacy of the free press.“We’ve seen too many journalists confuse not taking sides with not calling out liars and frauds,” Mnookin says.

The Departments of Homeland Security and Justice (DHS/DOJ) on Tuesday released a report on the threat of international terrorism. The new DHS/DOJ report produces little new information on immigration and terrorism and portrays some misleading and meaningless statistics as important findings. For example, since the beginning of 2002 through 2017, native-born Americans were responsible for 78 percent of all murders in terrorist attacks committed on U.S. soil while foreign-born terrorists only committed 22 percent. Including the actual number of deaths caused by terrorists flips the DHS/DOJ statistics on its head. Also: During 2002-2017, the chance of being murdered in a terrorist attack committed by a native-born American on U.S. soil was about one in 40.6 million per year. During the same period, the chance of being murdered by a foreign-born terrorist was about 145 million per year. The annual chance of being murdered in a non-terrorist homicide was about one in 19,325 per year, or about 1,641 times as great as being killed in any terrorist attack since 9/11.

The annual report from the Triangle Center on Terrorism and Homeland Security documents a continuing decline in the number of Muslim-Americans associated with violent extremism in 2017. The total for the first year of the Trump administration continued a downward trend which was visible in the final year of the Obama administration.Muslim-American extremists have caused 140 deaths in more than 16 years since September 11, 2001. Over the same period, there have been approximately 260,000 murders in the United States, and 267 lives were lost in mass shootings in 2017 alone (this figure does not include the victims of Muslim-American extremists).Since 2012, 78 Muslim-Americans have been identified as joining militants abroad, according to the report. More than half of these individuals have since been killed or detained.

The publication last week of a research paper offering a manual for re-creating an orthopoxvirus has been harshly criticized by both scientists and biosecurity experts as reckless and dangerous. The research demonstrates the potential to recreate the virus that causes smallpox—one of the greatest scourges the world has ever faced and eradicated. “The risks posed by the publication of methods that could ease the pathway for synthesizing smallpox should have been carefully weighed from the outset,” says one expert. Analysts say that the publication further accentuates the need for urgent global dialogue to develop clear norms and actions for reducing biological risks posed by advances in technology. “As governmental oversight continues to lag behind biotechnology breakthroughs, academic and private stakeholders conducting, funding, and publishing research - as well as those developing new technologies – also must take responsibility for mitigating risk,” says the expert.

On 19 January 2018, the open access scientific journal PLOS One published an article that describes the de novo synthesis of horsepox virus, the first ever synthesis of a member of the orthopoxvirus family of viruses that includes the variola virus that causes smallpox. This research crosses a red line in the field of biosecurity. Given the high degree of homology between orthopoxviruses, the techniques described in this article are directly applicable to the recreation of variola virus. The synthesis of horsepox virus takes the world one step closer to the reemergence of smallpox as a threat to global health security.The reemergence of smallpox would be a global health disaster. Prior to its eradication, smallpox killed an estimated 300 million people, more people than all the wars of the twentieth century combined.Based on these considerations, the horsepox synthesis research is all risk and no reward. Given the known risks of this research for pioneering a technique that can be used to recreate variola virus and its questionable benefits, the publication of this article represents a failure of PLOS One to exercise its responsibility to carefully consider the biosecurity implications of the research it publishes.

Researchers have developed a novel method to better protect Crypto Phones from eavesdropping and other forms of man-in-the-middle attacks. Crypto Phones consist of smartphone apps, mobile devices, personal computer or web-based Voice over Internet Protocol applications that use end-to-end encryption to ensure that only the user and the person they are communicating with can read what is sent. In order to secure what is being communicated, Crypto Phones require users to perform authentication tasks.

The field of urban planning is gaining interest as cities around the world are facing increased exposure to weather-related risks and hazards ranging from sea level rise and flooding to temperature build-up and urban heat island effect. A recently completed five-year research project examined 175 hazard mitigation plans adopted by counties and municipalities along the Gulf of Mexico and the U.S. Atlantic and Pacific Northwest coastlines. These local governments are required by the Federal Emergency Management Agency (FEMA) to adopt such plans to be eligible for pre-disaster and post-disaster mitigation funds. The National Research Council concluded that land use strategies that guide growth away from hazard areas are the most promising long-term solution to reducing risk; yet, land use strategies are rarely used. Instead, mitigation plans emphasize other mitigation approaches like levees, elevation of buildings and emergency management.

The Memorial Day 2015 Wimberley, Texas flood along the Blanco River destroyed 350 homes and claimed 13 lives. The Texas Hill Country, where Wimberly is located, is known as “Flash Flood Alley” because it leads North America as the most flash-flood prone region. In the past five years, Flash Flood Alley has seen two “500-year storms” and one “300-year storm.” Researchers call for better storm preparations in light of this revelation, to allow for blocking roads and evacuation of residents.

Rainfall changes caused by global warming will increase river flood risks across the globe. Already today, fluvial floods are among the most common and devastating natural disasters. Scientists have now calculated the required increase in flood protection until the 2040s worldwide, breaking it down to single regions and cities.Inaction would expose many millions of people to severe flooding.